Gửi #748074: Wavlink WN579A3 20210219 Command Injectionthông tin

tiêu đềWavlink WN579A3 20210219 Command Injection
Mô tảA vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/login.cgi. The manipulation of the argument key leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Nguồn⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/login.md
Người dùng
 Anonymous User
Đệ trình28/01/2026 09:10 (cách đây 3 các tháng)
Kiểm duyệt15/02/2026 10:01 (18 days later)
Trạng tháiđược chấp nhận
Mục VulDB346115 [Wavlink WL-WN579A3 đến 20210219 /cgi-bin/login.cgi key nâng cao đặc quyền]
điểm19

Do you want to use VulDB in your project?

Use the official API to access entries easily!